In 2019 Tenable Research took a look at available data on the vulnerabilities in use by Exploit Kits and the data Tenable possesses on the actual prevalence and viability of those exploits in the typical deployment. The resulting data yielded some interesting and surprising results that we will share and discuss in this webinar.

Here are some key takeaways from the webinar:
• Learn the role that exploit kits play in today's cybercrime attacks and where you are likely exposed
• Discover how focusing on closing out a small number of vulnerabilities across machines to close the most commonly attacked surfaces
• Learn about analytical tools that are available to help you with reducing vulnerability overloads.

Join Tenable and (ISC)² on Jun 19, 2019 (Wed) at 14:00 (GMT +8) to learn about the concerns of Exploit Kits.

Despite investment in next-gen technologies and employee awareness training, phishing threats continue to become more sophisticated and more effective. It’s time for organisations to accept that REAL phish are the REAL problem. Join the Cofense Phishing Threat Landscape review to discover the trends defining phishing in 2019 and priorities for defending your organisation going forward.

Attend this webinar to learn how attackers are:
• Using major malware types and their innovative tactics, techniques, and procedures
• Intensifying credential theft as organizations move infrastructure and applications to the cloud
• Evolving Emotet and the threat actors behind the botnet
• Increasing proliferation of sextortion phishing emails

It is generally agreed that there are three key pillars of a zero trust approach - Access, Identity and Posture. In previous webinars we have explored how an identity driven approach can be used with a cloud proxy to better secure access to internal applications. In the first part of this webinar we will dive deeper into the third pillar – posture- understand what it means to a user and their devices and see how it can be integrated into a zero trust architecture. The second part will look at the mitigation aspect of posture. We’ll cover the API attack trends – how attacks are moving from web into API with the explosive growth of apps – and the lifecycle of credential fraud.

Join Akamai Technologies and (ISC)² on May 22 to learn how to define security posture in a zero trust world.

More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² members from different regions on May 21, 2019 at 10:00AM Eastern as we discuss what pain points, issues and challenges they encounter in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.

As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. While Cloud Access Security Brokers (CASBs) were originally used solely for shadow IT discovery, they have since emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

In this webinar, we'll explore:
• Critical gaps in cloud applications that must be filled
• Four sets of capabilities required for cybersecurity in the cloud
• How CASBs provide specialized security that goes beyond native cloud app functionality like that of Office 365
• Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

Join Bitglass and (ISC)² on Apr 17, 2019 (Wed) at 11:00 (GMT +8) to learn how a CASB can help you meet your security and compliance requirements.

IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.

In this webinar, we will look at the changing landscape of DevOps. We will explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.

- How large is the cybersecurity workforce gap today
- Why you should pursue CISSP concentrations – ISSAP/ISSEP/ISSMP
- How to earn the certifications – exam and experience requirements
- The recent updates on membership benefits and policies
- And, ask any question that will support your certification journey

Are you ready to prove yourself? Register and begin your journey today!

• Information Systems Security Architecture Professional (ISSAP)
This certification proves your expertise developing, designing and analyzing security solutions. It also shows you excel at giving risk-based guidance to senior management in order to meet organizational goals.

• Information Systems Security Engineering Professional (ISSEP)
This certification recognizes your keen ability to practically apply systems engineering principles and processes to develop secure systems. You have the knowledge and skills to incorporate security into projects, applications, business processes and all information systems.

Identifying malicious bots and safeguarding against them is a top priority for organisations developing a sustainable security strategy.

Attend this webinar to learn:
• How bots infect, propagate, and attack applications
• What types of application attacks are commonly performed by bots
• How you can defend against bad bots without disrupting the good ones

Join F5 Networks and (ISC)² on Apr 3, 2019 (Wed) at 14:00 (GMT +8) to learn how to fight against the malicious bots.

NGFWs, IDS, sandboxes, DLP, etc are important - but increasingly, DNS is a major security weakness, allowing hackers to exfiltrate & infiltrate confidential data. This is a known issue because DNS was initially designed very simple and this attracts hackers to abuse the protocol. How do we protect our internal data and prevent hacker attacking the service?

Join Infoblox and (ISC)² on Mar 20, 2019 (Wed) at 14:00 (GMT +8) to learn the best practices in securing DNS.

Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.

In this info-session, you will learn:
- How large is the cybersecurity workforce gap today
- Why you should pursue CCSP
- How to earn the certifications – exam and experience requirements
- The recent updates on membership benefits and policies
- And, ask any question that will support your certification journey

Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.

=====================================================================

The CCSP shows you have the advanced technical skills and knowledge to design, manage and secure data, applications and infrastructure in the cloud using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

www.isc2.org/ccsp

Are you ready to prove yourself? Register and begin your CCSP journey today!

Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.